CN101611382B - Anti-tamper protected enclosure - Google Patents

Anti-tamper protected enclosure Download PDF

Info

Publication number
CN101611382B
CN101611382B CN2007800503367A CN200780050336A CN101611382B CN 101611382 B CN101611382 B CN 101611382B CN 2007800503367 A CN2007800503367 A CN 2007800503367A CN 200780050336 A CN200780050336 A CN 200780050336A CN 101611382 B CN101611382 B CN 101611382B
Authority
CN
China
Prior art keywords
protected enclosure
tamper protected
holding circuit
interference
tamper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007800503367A
Other languages
Chinese (zh)
Other versions
CN101611382A (en
Inventor
史蒂夫·徐
丹尼尔·航
肯基·曹
道格拉斯·曼彻斯特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verifone Inc
Original Assignee
Verifone Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verifone Inc filed Critical Verifone Inc
Publication of CN101611382A publication Critical patent/CN101611382A/en
Application granted granted Critical
Publication of CN101611382B publication Critical patent/CN101611382B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A device for containing sensitive data including a housing, an anti- tamper protected enclosure located within the housing and being adapted to contain the sensitive data, anti-tamper protection circuitry located within the anti-tamper protected enclosure and at least one ball grid array arranged within the housing and mounted on an outer surface of the anti-tamper protected enclosure and electrically coupled to the anti-tamper protection circuitry for protecting against unauthorized access to the interior of the anti-tamper protected enclosure.

Description

Anti-tamper protected enclosure
Technical field
The present invention relates generally to a kind of electron device that comprises sensitive data, more specifically, relates to the point of sales terminal of interference protection.
Background technology
Following american documentation literature is considered to represent the current state of prior art: United States Patent (USP) 6,646,565; 6,917,299 and 6,853,093.Thus, the disclosure of these patent documentations is incorporated into this by reference.
Summary of the invention
The present invention is devoted to provide a kind of improved security system, is used for electron device, particularly, and the point of sales terminal of interference protection and comprise other devices such as the sensitive information of personal data.For this instructions and claims, term " point of sales terminal " includes but not limited to PIN PAD, electronic cash register, ATM, card payment terminal and so on.
Therefore, according to a preferred embodiment of the invention, provide a kind of device that is used to hold sensitive data, comprising: housing; Anti-tamper protected enclosure, it is positioned at said housing and is suitable for holding said sensitive data; Anti-interference holding circuit, it is positioned at said anti-tamper protected enclosure; With at least one BGA device; It is arranged in the said housing; And be installed on the outside surface of said anti-tamper protected enclosure, and be electrically connected to said anti-interference holding circuit, the inside that prevents to touch without permission said anti-tamper protected enclosure to be used to protect.
Term " BGA device " refers to the circuit devcie that is encapsulated in the ball grid array package.
Preferably, said device also comprises the confidential data memory element that is positioned at said anti-tamper protected enclosure.Additionally or replaceability ground, said device also comprises the data input element that is installed in the said housing.Said BGA device preferably includes wire-bonded circuitry.
Preferably; At least to the situation of a Physical Interference, said anti-interference holding circuit is operationally carried out at least a in the following behavior: produce the alarm indication, make said component failure and wipe said sensitive data in to said at least one BGA.
According to a preferred embodiment, said device is a point of sales terminal.
According to another preferred embodiment of the invention, also provide a kind of anti-tamper protected enclosure, comprising: anti-interference holding circuit, it is positioned at said anti-tamper protected enclosure; With at least one BGA device, it is installed on the outside surface of said anti-tamper protected enclosure, and is electrically connected to said anti-interference holding circuit, the inside that prevents to touch without permission said anti-tamper protected enclosure to be used to protect.Preferably, said BGA device comprises wire-bonded circuitry.
Preferably, said anti-tamper protected enclosure comprises at least one grid that is electrically connected to said anti-interference holding circuit.In addition, said anti-interference holding circuit is connected to said at least one conductor networks via said at least one BGA device.In addition, said anti-interference holding circuit is connected to said at least one conductor networks through electrical connection section, and said electrical connection section extend past is by the hole, road of said at least one BGA device institute physical protection.
Preferably, the provider location of said at least one BGA device is chosen at least one electrical connection section in said anti-tamper protected enclosure physical protection to be provided.Additionally or substituting ground, said at least one BGA device comprises the ball that is not electrically connected to said anti-interference holding circuit.
Preferably, said anti-interference holding circuit comprises at least one flexible printed circuit board.Additionally or substituting ground, said anti-tamper protected enclosure comprises at least one printed circuit board.
Preferably, said anti-tamper protected enclosure also has the confidential data memory element that is positioned at wherein.
Preferably, said anti-interference holding circuit comprises comparator circuit.Additionally or substituting ground, one of at least under the situation of Physical Interference, said anti-interference holding circuit can be operated and produced the alarm indication in to said at least one BGA.
Description of drawings
From the hereinafter detailed description with the accompanying drawing, will more at large understand and cognitive the present invention, in the accompanying drawings:
Fig. 1 is the simplified illustration diagram of constructed according to a preferred embodiment of the invention and exercisable point of sales terminal;
Fig. 2 is the simplified illustration diagram of biopsy cavity marker devices of anti-tamper protected enclosure of a part that forms the point of sales terminal of Fig. 1;
Fig. 3 is the simplified electrical circuit diagram to the electrical connection section of the anti-interference holding circuit of in the point of sales terminal of Fig. 1 and 2, using; With
Fig. 4 is that diagram is summarized in the simplification of a part of the circuit of Fig. 3.
Embodiment
Referring now to Fig. 1 and Fig. 2, Fig. 1 and Fig. 2 are that the simplified illustration of point of sales terminal 100 illustrates and formation makes up according to the preferred embodiment of the present invention and the biopsy cavity marker devices simplified illustration diagram of the anti-tamper protected enclosure of the part of exercisable formation point of sales terminal 100.The point of sales terminal of Fig. 1 preferably includes housing 110 and is installed in the data input element such as keyboard 112 in this housing.Preferably; Anti-tamper protected enclosure 114 is positioned at housing 110; And comprise one or more conductor networks with embedded electric conductor 118; Such as network 116 and 117, said embedded electric conductor 118 is electrically connected to anti-interference holding circuit 120, and anti-interference holding circuit 120 form especially is the integrated circuit that is arranged in anti-tamper protected enclosure 114.
Anti-tamper protected enclosure 114 can be formed by any suitable material.For example, it can be formed by a plurality of printed circuit board (PCB)s, and wherein, conductor networks is limited the conductor 118 that is formed on its one or more layers, and said one or more layers preferably include embedded layer.Alternatively, rigidity or nonrigid big envelope can be set up and be wrapped in one or more layers the flexible PCB, and said one or more layers flexible PCB has formed or embedded therein one or more conductor networks above that.
According to a preferred embodiment of the invention, at least one BGA device 124 is arranged in the housing 110 and is installed on the outside surface 126 of anti-tamper protected enclosure 114, and wherein this BGA device 124 comprises the encapsulation that the enhancement mode physical protection is provided.BGA device 124 preferably is electrically connected to anti-interference holding circuit; And be electrically connected to one or more conductor networks 116 and 117; So that protect, to touch anti-tamper protected enclosure 114, more specifically with preventing unauthorized; Prevent to touch the Key Circuit element, such as data storage elements 128, anti-interference holding circuit 120 with such as the electrical connection section in hole, road 130.It is understandable that, if this type of Key Circuit element can be by unwarranted personnel contact, with regard to the entail dangers to sensitive information, for example encryption key and personally identifiable information.
In the illustrated embodiment of Fig. 1 and 2, two BGA devices 124 are arranged on the right outside surface of two opposite faces of protection big envelope 114.It is understandable that, on any suitable surface of big envelope 114,, can adopt more or BGA device still less 124 according to circuit layout wherein.Preferably, BGA device 124 is arranged to make their entities to cover on the Key Circuit element of installing or placing in roughly the same position.
Referring now to Fig. 3 and 4, Fig. 3 and 4 diagrams are to the preferred disposition of the electrical connection section of anti-interference holding circuit 120.Can find out; Preferably be provided with a pair of parallel conductance path; Every paths provides following connection; This connection from power supply, cross over and one or morely to have the conductor networks 117 that embeds electric conductor, cross over BGA device and the local at least various conductive paths that limit of one or more conductor networks 116, the input end and the extension betwixt that arrive anti-interference holding circuit 120, said one or more conductor networks 116 comprise selected resistance.Anti-interference holding circuit 120 preferably includes comparator circuit, and it compares the impedance along parallelly connected path, so that will cause being indicated by the alarm of anti-interference holding circuit 120 generations to any Physical Interference of BGA device.Anti-interference holding circuit 120 can adopt the protectiveness step, and point of sales terminal was lost efficacy, and wipes all data on data storage elements 128, and sends tamper alert message.
It is understandable that the configuration of the various conductive paths that limited BGA device 124 can be random, but preferably include the conductive path interconnection balls that is not positioned at the BGA device periphery.It is understandable that, there is no need to make all balls to form a part that connects.
In the examples shown of Fig. 3, direct supply VSRAM 200 is arranged on 3.3 volts voltage place especially, and is connected in series to the ball A that forms BGA device 124 parts via resistor 202 and via first conductor networks 117.Ground connect 204 be connected in series to BGA device 124 via resistor 206 and via another conductor networks 117 ball B.
Ball A preferably is electrically connected to the ball C of BGA device 124 through wire-bonded in BGA device 124.Ball C is connected in series to the ball D of BGA device 124 via resistor 208 and via the part of conductor element 116.Ball D preferably is electrically connected to the ball E of BGA device 124 through wire-bonded.Ball E in series is connected to first input end 214 of anti-interference holding circuit 120 via resistor 210 and resistor 212 via the part of conductor networks 116.
Ball C in series is connected to the ball F of BGA device 124 via resistor 216 via the part of conductor networks 116.Ball F preferably is electrically connected to the ball G of BGA device 124 through wire-bonded.Ball G in series is connected to first input end 214 of anti-interference holding circuit 120 via resistor 218 and via resistor 212 via the part of conductor networks 116.
Can be connected between second input terminal 219 of ball B and anti-interference holding circuit 120 with similar or consistent circuit mentioned above.
Be illustrated in detail in the formation part 220 of the part in a parallelly connected path wherein in the circuit mentioned above among Fig. 4.For the purpose of clear, Fig. 4 four layers of PCB of form diagram to a certain degree to amplify, its typically form big envelope 114 (Fig. 1 and 2) its go up the wall of installation BGA device 124 (Fig. 1 and 2).
Can find out among Fig. 4 that being connected in series between resistor 208 and ball C passed along electroplating ventilating hole (PTH) hole, road 221.Being connected in series between resistor 216 and ball C passed along hole, PTH road 222 and via conductor networks 116 parts.Being connected in series between resistor 208 and ball D passed along hole, PTH road 224 and via conductor networks 116 parts and along hole, PTH road 226.Being connected in series between resistor 216 and ball F passed along hole, PTH road 228.Being connected in series along hole, PTH road 230, passing between ball E and resistor 210 along the part of conductor networks 116 and along blind via hole 232.Being connected in series between resistor 218 and ball G along blind hole 234, along the part of conductor networks 116, and pass along hole, PTH road 236.Being connected in series between ball A and resistor 202 passed along hole, PTH road 238 and along conductor networks 117.Between resistor 212 and resistors in parallel 210 and 218, also be provided with and be connected in series.
Ball A preferably is connected to the ball C in BGA device 124 through wire-bonded via aluminium conductor 240.Ball G preferably is connected to the ball F in BGA device 124 through wire-bonded.Ball E preferably is connected to the ball D in BGA device 124 through wire-bonded.
Preferably, BGA device 124 is placed on the position that overlaps with hole, a plurality of road, and is as shown in the figure, and this has just prevented to touch these holes, road basically.
It is understandable that, can be provided with and the similar a plurality of circuit of circuit mentioned above.Will also be appreciated that printed circuit board (PCB) can be made up of the layer of any suitable number, preferred two layers or more a plurality of layer.Will also be appreciated that in addition and can adopt BGA device to come to the hole, various similar road that carries sensitive signal protection to be provided, hole, said road for example is through hole, blind hole and buried via hole.
According to a replaceability embodiment, conductor networks can be removed, and BGA device is directly connected to disturbance detection circuit.According to another replaceability embodiment, various conductor networks can be connected to various power supplys, and every kind of power supply has different voltages.
Those skilled in the art will recognize that the present invention is not limited to the content that preceding text specifically illustrate and describe.On the contrary, scope of the present invention comprises various combination of features of the present invention and the transformation of the present invention that does not belong to prior art that son makes up and those skilled in the art can carry out after reading above-mentioned instructions.

Claims (20)

1. device that is used to hold sensitive data comprises:
Housing;
Anti-tamper protected enclosure, it is positioned at said housing and is suitable for holding said sensitive data;
Anti-interference holding circuit, it is positioned at said anti-tamper protected enclosure; With
At least one BGA device; It is arranged in the said housing; And be installed on the outside surface of said anti-tamper protected enclosure, said at least one BGA device comprises several balls, a plurality of at least balls in said several balls are electrically connected to said anti-interference holding circuit; The inside that prevents to touch without permission said anti-tamper protected enclosure to be used to protect
Wherein, said at least one BGA device comprises the ball that is not electrically connected to said anti-interference holding circuit; And
Wherein, in to said at least one BGA one of at least under the situation of Physical Interference, said anti-interference holding circuit is operationally carried out at least a in the following behavior: produce the alarm indication, make said component failure and wipe said sensitive data.
2. device according to claim 1 also comprises the confidential data memory element that is positioned at said anti-tamper protected enclosure.
3. device according to claim 1, wherein said at least one BGA device comprises wire-bonded circuitry.
4. device according to claim 1, wherein said anti-tamper protected enclosure comprise at least one conductor networks that is electrically connected to said anti-interference holding circuit.
5. device according to claim 4, wherein said anti-interference holding circuit is connected to said at least one conductor networks via said at least one BGA device.
6. device according to claim 5, wherein said anti-interference holding circuit is connected to said at least one conductor networks through electrical connection section, and said electrical connection section extend past is by the hole, road of said at least one BGA device institute physical protection.
7. device according to claim 1, the provider location of wherein said at least one BGA device are chosen at least one electrical connection section in said anti-tamper protected enclosure physical protection to be provided.
8. device according to claim 1, wherein said anti-interference holding circuit comprises at least one flexible printed circuit board.
9. device according to claim 1, wherein said anti-tamper protected enclosure comprises at least one printed circuit board.
10. device according to claim 1, wherein said device is a point of sales terminal.
11. an anti-tamper protected enclosure comprises:
Anti-interference holding circuit, it is positioned at said anti-tamper protected enclosure; With
At least one BGA device; It is installed on the outside surface of said anti-tamper protected enclosure; Said at least one BGA device comprises several balls; A plurality of at least balls in said several balls are electrically connected to said anti-interference holding circuit, the inside that prevents to touch without permission said anti-tamper protected enclosure to be used to protect;
Wherein, said at least one BGA device comprises the ball that is not electrically connected to said anti-interference holding circuit; And
Wherein, one of at least under the situation of Physical Interference, said anti-interference holding circuit operationally produces the alarm indication in to said at least one BGA.
12. anti-tamper protected enclosure according to claim 11 also comprises the confidential data memory element that is positioned at it.
13. anti-tamper protected enclosure according to claim 11 comprises at least one conductor networks that is electrically connected to said anti-interference holding circuit.
14. anti-tamper protected enclosure according to claim 13, wherein said anti-interference holding circuit is connected to said at least one conductor networks via said at least one BGA device.
15. anti-tamper protected enclosure according to claim 14; Wherein said anti-interference holding circuit is connected to said at least one conductor networks through electrical connection section, and said electrical connection section extend past is by the hole, road of said at least one BGA device institute physical protection.
16. anti-tamper protected enclosure according to claim 11, the provider location of wherein said at least one BGA device are chosen at least one electrical connection section in said anti-tamper protected enclosure physical protection to be provided.
17. anti-tamper protected enclosure according to claim 11, wherein said anti-interference holding circuit comprises at least one flexible printed circuit board.
18. anti-tamper protected enclosure according to claim 11, wherein said anti-tamper protected enclosure comprises at least one printed circuit board.
19. anti-tamper protected enclosure according to claim 11, wherein said anti-interference holding circuit comprises comparator circuit.
20. anti-tamper protected enclosure according to claim 11, wherein said at least one BGA device comprises wire-bonded circuitry.
CN2007800503367A 2007-01-25 2007-12-27 Anti-tamper protected enclosure Active CN101611382B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/627,166 2007-01-25
US11/627,166 US7898413B2 (en) 2007-01-25 2007-01-25 Anti-tamper protected enclosure
PCT/US2007/088883 WO2008091470A1 (en) 2007-01-25 2007-12-27 Anti-tamper protected enclosure

Publications (2)

Publication Number Publication Date
CN101611382A CN101611382A (en) 2009-12-23
CN101611382B true CN101611382B (en) 2012-07-04

Family

ID=39644774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007800503367A Active CN101611382B (en) 2007-01-25 2007-12-27 Anti-tamper protected enclosure

Country Status (4)

Country Link
US (2) US7898413B2 (en)
EP (1) EP2108150A4 (en)
CN (1) CN101611382B (en)
WO (1) WO2008091470A1 (en)

Families Citing this family (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7898413B2 (en) * 2007-01-25 2011-03-01 Verifone, Inc. Anti-tamper protected enclosure
US9013336B2 (en) * 2008-01-22 2015-04-21 Verifone, Inc. Secured keypad devices
US8595514B2 (en) 2008-01-22 2013-11-26 Verifone, Inc. Secure point of sale terminal
US8432300B2 (en) 2009-03-26 2013-04-30 Hypercom Corporation Keypad membrane security
CN102804234B (en) * 2009-06-09 2016-03-09 吉尔巴科公司 fuel dispenser user interface
CN101697182B (en) * 2009-09-29 2011-10-05 广州广电运通金融电子股份有限公司 Encryption keyboard
US8295058B2 (en) * 2009-12-18 2012-10-23 International Business Machines Corporation Structure for enhancing reference return current conduction
US8358218B2 (en) * 2010-03-02 2013-01-22 Verifone, Inc. Point of sale terminal having enhanced security
TWM388677U (en) * 2010-03-31 2010-09-11 Uniform Ind Corp Electronic device and its protection mechanism
US8330606B2 (en) 2010-04-12 2012-12-11 Verifone, Inc. Secure data entry device
US8405506B2 (en) 2010-08-02 2013-03-26 Verifone, Inc. Secure data entry device
US8593824B2 (en) 2010-10-27 2013-11-26 Verifone, Inc. Tamper secure circuitry especially for point of sale terminal
US8621235B2 (en) 2011-01-06 2013-12-31 Verifone, Inc. Secure pin entry device
US9166586B2 (en) 2012-05-09 2015-10-20 Gilbarco Inc. Fuel dispenser input device tamper detection arrangement
US8786272B2 (en) 2011-05-11 2014-07-22 Gilbarco Inc. Fuel dispenser input device tamper detection arrangement
JP5062705B1 (en) 2011-07-07 2012-10-31 Necインフロンティア株式会社 Flexible printed cable and information processing apparatus
US8884757B2 (en) 2011-07-11 2014-11-11 Verifone, Inc. Anti-tampering protection assembly
US9762150B2 (en) 2011-09-13 2017-09-12 Mide Technology Corporation Self-powered sensor system
US9691066B2 (en) 2012-07-03 2017-06-27 Verifone, Inc. Location-based payment system and method
GB2507954B (en) * 2012-10-13 2018-07-04 Korala Associates Ltd A user terminal system and method
US9798902B2 (en) 2012-10-25 2017-10-24 Mide Technology Corporation Self-powered anti-tamper sensors
US9323957B2 (en) * 2013-03-01 2016-04-26 Marvell World Trade Ltd. Anti-tamper system based on dual random bits generators for integrated circuits
FR3008524B1 (en) * 2013-07-12 2017-05-05 Compagnie Ind Et Financiere Dingenierie Ingenico ELECTRONIC PAYMENT DEVICE HAVING MEANS FOR BLOCKING ACCESS TO TAX MEMORY.
GB2518861B (en) * 2013-10-02 2016-01-20 Powa Technologies Ltd Secure data entry device
US9213869B2 (en) 2013-10-04 2015-12-15 Verifone, Inc. Magnetic stripe reading device
US9997492B2 (en) 2013-11-21 2018-06-12 Nxp Usa, Inc. Optically-masked microelectronic packages and methods for the fabrication thereof
TWM480119U (en) * 2014-02-26 2014-06-11 Uniform Ind Corp Card reader with a plurality of protection reticles
US20160026275A1 (en) 2014-07-23 2016-01-28 Verifone, Inc. Data device including ofn functionality
WO2016042543A1 (en) 2014-09-16 2016-03-24 Verifone, Inc. Secure smartcard reader
US10579833B1 (en) * 2014-12-16 2020-03-03 Thales Esecurity, Inc. Tamper detection circuit assemblies and related manufacturing processes
US9208361B1 (en) 2014-12-18 2015-12-08 Verifone Inc. Magnetic stripe card reader
US10007811B2 (en) 2015-02-25 2018-06-26 Private Machines Inc. Anti-tamper system
US9560737B2 (en) 2015-03-04 2017-01-31 International Business Machines Corporation Electronic package with heat transfer element(s)
US9595174B2 (en) 2015-04-21 2017-03-14 Verifone, Inc. Point of sale terminal having enhanced security
US10426037B2 (en) 2015-07-15 2019-09-24 International Business Machines Corporation Circuitized structure with 3-dimensional configuration
US9591776B1 (en) 2015-09-25 2017-03-07 International Business Machines Corporation Enclosure with inner tamper-respondent sensor(s)
US9924591B2 (en) 2015-09-25 2018-03-20 International Business Machines Corporation Tamper-respondent assemblies
US10175064B2 (en) 2015-09-25 2019-01-08 International Business Machines Corporation Circuit boards and electronic packages with embedded tamper-respondent sensor
US9911012B2 (en) 2015-09-25 2018-03-06 International Business Machines Corporation Overlapping, discrete tamper-respondent sensors
US10172239B2 (en) 2015-09-25 2019-01-01 International Business Machines Corporation Tamper-respondent sensors with formed flexible layer(s)
US10098235B2 (en) 2015-09-25 2018-10-09 International Business Machines Corporation Tamper-respondent assemblies with region(s) of increased susceptibility to damage
US9894749B2 (en) 2015-09-25 2018-02-13 International Business Machines Corporation Tamper-respondent assemblies with bond protection
US9578764B1 (en) 2015-09-25 2017-02-21 International Business Machines Corporation Enclosure with inner tamper-respondent sensor(s) and physical security element(s)
US10143090B2 (en) 2015-10-19 2018-11-27 International Business Machines Corporation Circuit layouts of tamper-respondent sensors
US9978231B2 (en) 2015-10-21 2018-05-22 International Business Machines Corporation Tamper-respondent assembly with protective wrap(s) over tamper-respondent sensor(s)
US9913389B2 (en) 2015-12-01 2018-03-06 International Business Corporation Corporation Tamper-respondent assembly with vent structure
US10327343B2 (en) 2015-12-09 2019-06-18 International Business Machines Corporation Applying pressure to adhesive using CTE mismatch between components
US9555606B1 (en) 2015-12-09 2017-01-31 International Business Machines Corporation Applying pressure to adhesive using CTE mismatch between components
US9554477B1 (en) 2015-12-18 2017-01-24 International Business Machines Corporation Tamper-respondent assemblies with enclosure-to-board protection
US10678958B2 (en) 2015-12-28 2020-06-09 Intelligent Technologies International, Inc. Intrusion-protected memory component
US9916744B2 (en) 2016-02-25 2018-03-13 International Business Machines Corporation Multi-layer stack with embedded tamper-detect protection
FR3050048B1 (en) * 2016-04-08 2018-04-27 Ingenico Group OPENING DETECTION OF A DATA ENTRY DEVICE
US9904811B2 (en) 2016-04-27 2018-02-27 International Business Machines Corporation Tamper-proof electronic packages with two-phase dielectric fluid
US9881880B2 (en) 2016-05-13 2018-01-30 International Business Machines Corporation Tamper-proof electronic packages with stressed glass component substrate(s)
US9913370B2 (en) 2016-05-13 2018-03-06 International Business Machines Corporation Tamper-proof electronic packages formed with stressed glass
US9858776B1 (en) 2016-06-28 2018-01-02 International Business Machines Corporation Tamper-respondent assembly with nonlinearity monitoring
US10321589B2 (en) * 2016-09-19 2019-06-11 International Business Machines Corporation Tamper-respondent assembly with sensor connection adapter
US10299372B2 (en) 2016-09-26 2019-05-21 International Business Machines Corporation Vented tamper-respondent assemblies
US10271424B2 (en) 2016-09-26 2019-04-23 International Business Machines Corporation Tamper-respondent assemblies with in situ vent structure(s)
US9999124B2 (en) 2016-11-02 2018-06-12 International Business Machines Corporation Tamper-respondent assemblies with trace regions of increased susceptibility to breaking
US10327329B2 (en) 2017-02-13 2019-06-18 International Business Machines Corporation Tamper-respondent assembly with flexible tamper-detect sensor(s) overlying in-situ-formed tamper-detect sensor
CN111868729B (en) * 2017-10-25 2024-03-08 国际智能技术公司 Intrusion protected storage component
US10306753B1 (en) 2018-02-22 2019-05-28 International Business Machines Corporation Enclosure-to-board interface with tamper-detect circuit(s)
US10740499B2 (en) * 2018-03-12 2020-08-11 Nuvoton Technology Corporation Active shield portion serving as serial keypad
US11122682B2 (en) 2018-04-04 2021-09-14 International Business Machines Corporation Tamper-respondent sensors with liquid crystal polymer layers
US10544923B1 (en) 2018-11-06 2020-01-28 Verifone, Inc. Devices and methods for optical-based tamper detection using variable light characteristics
US10925154B2 (en) * 2019-01-31 2021-02-16 Texas Instruments Incorporated Tamper detection
US11645427B2 (en) 2020-11-29 2023-05-09 Bank Of America Corporation Detecting unauthorized activity related to a device by monitoring signals transmitted by the device
US12051277B1 (en) 2021-06-03 2024-07-30 Amazon Technologies, Inc. Multi-sensor input device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503099A (en) * 2002-11-26 2004-06-09 上海百利恒电器有限公司 Structure and configuration of anti-interference computer casing

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3818330A (en) * 1972-08-17 1974-06-18 Hitachi Ltd Device having a bridge circuit for detecting faults in an electric network
US4593384A (en) * 1984-12-21 1986-06-03 Ncr Corporation Security device for the secure storage of sensitive data
FR2640781B1 (en) 1988-12-20 1992-04-10 Bull Sa DEVICE FOR PROTECTING AN ELECTRONIC CARD AND USE FOR PROTECTING A MAGNETIC AND / OR MICROPROCESSOR READING TERMINAL
US5389738A (en) * 1992-05-04 1995-02-14 Motorola, Inc. Tamperproof arrangement for an integrated circuit device
FR2727227B1 (en) 1994-11-17 1996-12-20 Schlumberger Ind Sa ACTIVE SECURITY DEVICE WITH ELECTRONIC MEMORY
US5674319A (en) * 1995-02-24 1997-10-07 Avery Dennison Corporation Die coater and method for applying material to webs of different widths
TW471144B (en) 1995-03-28 2002-01-01 Intel Corp Method to prevent intrusions into electronic circuitry
US5627520A (en) * 1995-07-10 1997-05-06 Protell Systems International, Inc. Tamper detect monitoring device
WO1997004376A1 (en) 1995-07-20 1997-02-06 Dallas Semiconductor Corporation Secure module with microprocessor and co-processor
US5675319A (en) 1996-04-26 1997-10-07 David Sarnoff Research Center, Inc. Tamper detection device
US5861662A (en) 1997-02-24 1999-01-19 General Instrument Corporation Anti-tamper bond wire shield for an integrated circuit
US6301670B1 (en) 1998-10-06 2001-10-09 Ricoh Corporation Method and apparatus for erasing data when a problem is identified
US6396400B1 (en) 1999-07-26 2002-05-28 Epstein, Iii Edwin A. Security system and enclosure to protect data contained therein
GB2353399A (en) * 1999-08-20 2001-02-21 3Com Corp Testing printed or integrated circuits
AU2001253818A1 (en) * 2000-02-14 2001-08-20 Christina Alvarez Security module system, apparatus and process
US6646565B1 (en) 2000-06-01 2003-11-11 Hewlett-Packard Development Company, L.P. Point of sale (POS) terminal security system
JP2002108711A (en) 2000-09-29 2002-04-12 Tamura Electric Works Ltd Data processor and data processing method
TW511414B (en) * 2001-04-19 2002-11-21 Via Tech Inc Data processing system and method, and control chip, and printed circuit board thereof
US7065656B2 (en) * 2001-07-03 2006-06-20 Hewlett-Packard Development Company, L.P. Tamper-evident/tamper-resistant electronic components
JP2003317202A (en) 2002-04-11 2003-11-07 Cis Electronica Industria & Comercio Ltda Magnetic head for magnetic reader
US6930381B1 (en) * 2002-04-12 2005-08-16 Apple Computer, Inc. Wire bonding method and apparatus for integrated circuit
US6911608B2 (en) * 2002-05-23 2005-06-28 Digit Wireless, Llc Keypads and key switches
US6853093B2 (en) 2002-12-20 2005-02-08 Lipman Electronic Engineering Ltd. Anti-tampering enclosure for electronic circuitry
WO2004078787A1 (en) 2003-03-06 2004-09-16 Cypak Ab Tamper evident packaging
EP1523228A3 (en) 2003-10-09 2008-03-05 Matsushita Electric Industrial Co., Ltd. Mobile terminal, circuit board, circuit board design aiding apparatus and method, design aiding program, and storage medium having stored therein design aiding program
US7064670B2 (en) 2004-02-25 2006-06-20 Dmatek, Ltd. Method and apparatus for portable transmitting devices
WO2005086546A2 (en) 2004-03-04 2005-09-15 Lipman Electronics Engineering Limited Secure card reader
US7506812B2 (en) 2004-09-07 2009-03-24 Semtek Innovative Solutions Corporation Transparently securing data for transmission on financial networks
US7309012B2 (en) 2004-09-07 2007-12-18 Semtek Innovative Solutions, Inc. Secure magnetic stripe reader for handheld computing and method of using same
US20060192653A1 (en) 2005-02-18 2006-08-31 Paul Atkinson Device and method for selectively controlling the utility of an integrated circuit device
FR2888975B1 (en) * 2005-07-21 2007-09-07 Atmel Corp SECURITY METHOD FOR DATA PROTECTION
US7788801B2 (en) * 2005-07-27 2010-09-07 International Business Machines Corporation Method for manufacturing a tamper-proof cap for an electronic module
US7388484B2 (en) * 2005-08-16 2008-06-17 Honeywell International Inc. Conductive tamper switch for security devices
WO2007136022A1 (en) * 2006-05-22 2007-11-29 Semiconductor Energy Laboratory Co., Ltd. Semiconductor device and position detection system using semiconductor device
US7898413B2 (en) * 2007-01-25 2011-03-01 Verifone, Inc. Anti-tamper protected enclosure
US7923830B2 (en) * 2007-04-13 2011-04-12 Maxim Integrated Products, Inc. Package-on-package secure module having anti-tamper mesh in the substrate of the upper package
US8115621B2 (en) * 2007-05-01 2012-02-14 Yoganand Rajala Device for tracking the movement of individuals or objects
US8522051B2 (en) * 2007-05-07 2013-08-27 Infineon Technologies Ag Protection for circuit boards
US20080278353A1 (en) * 2007-05-11 2008-11-13 Measurement Specialties, Inc. Tamper resistant electronic transaction assembly
EP2198384B1 (en) * 2007-10-09 2012-12-05 NDS Limited Tamper-detecting electronic system
US8111063B2 (en) * 2008-09-25 2012-02-07 Cellnet Innovations, Inc. Magnetic rotation sensing

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503099A (en) * 2002-11-26 2004-06-09 上海百利恒电器有限公司 Structure and configuration of anti-interference computer casing

Also Published As

Publication number Publication date
US7898413B2 (en) 2011-03-01
CN101611382A (en) 2009-12-23
US20080180245A1 (en) 2008-07-31
WO2008091470A1 (en) 2008-07-31
EP2108150A1 (en) 2009-10-14
US20110122563A1 (en) 2011-05-26
EP2108150A4 (en) 2013-12-11

Similar Documents

Publication Publication Date Title
CN101611382B (en) Anti-tamper protected enclosure
US6686539B2 (en) Tamper-responding encapsulated enclosure having flexible protective mesh structure
US7791898B2 (en) Security apparatus
JP5576276B2 (en) Unauthorized opening reaction system
CN100576985C (en) Safety cover
US20100327856A1 (en) Security Device
EP1421549B1 (en) A pin pad
US6710269B2 (en) Foil keyboard with security system
US7812428B2 (en) Secure connector grid array package
US20090212945A1 (en) Intrusion detection systems for detecting intrusion conditions with respect to electronic component enclosures
AU4811201A (en) Point of sale (POS) terminal security system
US8977868B2 (en) Flexible printed cable and information processing device
US20110255253A1 (en) Protective serpentine track for card payment terminal
CN100464340C (en) Safety protecting box
CN107787499A (en) To prevent physics change and/or the IC chip protection of electricity change
BR102012010461B1 (en) SYSTEM FOR MECHANICAL AND ELECTRONIC PROTECTION OF SAFE EQUIPMENT
CN101866400A (en) Memory card reader
WO2007018761A2 (en) Security method for data protection
CN113574570B (en) Apparatus and method for tamper detection
US8179682B2 (en) Multilayer circuit board and use of a multilayer circuit board
CN116432252A (en) Anti-disclosure board card, anti-disclosure method and electronic equipment
BRPI1101001A2 (en) method of mechanical and electronic protection of safety equipment based on plates and tapes
BRPI1101244A2 (en) smart card connector protection system for data security equipment
BRMU9103184Y1 (en) constructive arrangement of electronic and mechanical protection of sensitive electronic circuits

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP02 Change in the address of a patent holder

Address after: The United States of California, Maria Duff West No. 88

Patentee after: Verifone Inc.

Address before: American California

Patentee before: Verifone Inc.